A shortage of skilled security staff coupled with criminals finding new ways to infiltrate networks, is causing security alert fatigue to set in at many organizations. This leaves staff cutting corners, at times only processing 5% to 10% of security alerts to try and keep up.

In this webinar Duane Kuroda and Curtis Wray will shine a light on this problem and provide best practices to help you take charge. They will share actionable tips and tricks to help you begin to gain control of your incident response process and keep you secured against advanced threats.

Join this webinar to help your security operations team learn:

• The types of threats seen in higher education and the challenges of managing them
• The impact of security alert fatigue
• How educational institutions are handling these threats today
• Key aspects in which IR teams should prioritize
• What is needed to reduce effort while optimizing resolution

Anyone can be a VAP: Very Attacked Person™ and they're not always the people you expect.

While Microsoft Office 365 allows your people to work anywhere, anytime, on any device, it can also create security issues making your people vulnerable. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats.

In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us live as we discuss

- Predictions for the 2019 threat landscape
- Key actions you can take to prepare your organization
- Top resources to help support your security efforts

For this week's Interesting Threat Byte, we bring you Happy Holidays from TA505! TA505 is the designation for Threat Actor 505, one of the most prolific threat actors observed by Proofpoint. TA505 was responsible for the largest Dridex, Locky, Jaff and The Trick campaigns. Due to the variety of malware delivered by this group, demonstrates their deep connections to the underground malware scene.

Proofpoint has been watching TA505 for quite some time and has data dating back to 2014 when they launched their first Dridex campaign. When TA505 changes their tactics, other threat actors tend to follow. Just in time for the holidays, Proofpoint has noticed that TA505 is sending out fewer ransomware campaigns and instead focusing on smaller more targeted attacks. Why you ask? The value of cryptocurrency has dropped significantly, leading to threat actors looking for new and creative ways to get money from unsuspecting victims.

For this week's Interesting Threat Byte, we bring you Sextortion! Sextortion is a category of scams where threat actors claim to have compromising information about the victim and threaten to expose their activities if an extortion payment is not made. We also focus on a recent Sextortion campaign that demanded $381 of Bitcoin.

. CobInt is a fairly new malware, discovered in early 2018, and seems to only be doing reconnaissance for now. It is a three stage malware with the ability to download additional modules when it's ready to strike. Like the other malwares in this series, CobInt uses clever techniques to disguise and hide itself from security researchers. CobInt is spread by a threat actor sending an email to a victim with a Microsoft Word document containing macros. If the macro is enabled, CobInt is downloaded.

tRAT is a new Remote Access Trojan (RAT) that was first discovered back in September. The first campaigns included fake Norton Security and TripAdvisor brands as lures to get victim's to open the included Microsoft Word document, enabling macros.

On October 11, 2018, Proofpoint discovered another tRAT campaign, but this time by threat actor TA505.

AdvisorsBot, is part of a group of recently discovered downloader malwares. AdvisorsBot is targeting hotels, restaurants, and telecommunications companies and is notable because it is currently only collecting system information, can download other modules/payloads, connects back to command and control servers and has many anti-analysis checks built into the code.

What are the key components of a best-in-class solution for phishing simulation and training?

Join us for a live demo of Wombat Security to see for yourself!
Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.

PCAD is fast and easy to deploy, and it secures Office 365 users on any network or device. This allows you to confidently drive your business forward and make the most of Office 365.

Attackers use a variety of methods to compromise Office 365 accounts. And once they do, they can launch attacks inside and outside of your organization. This impacts your reputation and your finance. Our multi-faceted approach helps you detect account compromise and the activities that leverage stolen credentials.

The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors who use these tactics usually aim to fraud the company, its customers or partners.

Join us for a discussion on the clever methods used to compromise accounts and the headaches that come from it, whether it be phishing or data theft, and the steps your organization can take to help mitigate the threat.

Join this webinar to learn:

• The damage compromised accounts cause, from stolen customer data, to wire fraud
• Why bad actors choose to target people rather than infrastructure
• What you can do to keep your accounts secure

Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

The internet has grown to more than 330 million unique domain names and three billion users. Digital transformation means that email, web, social and mobile have become essential channels of engagement for your business but they also increase your exposure to cyber threats, and escalate the level of digital risk.

Your marketing team is connecting with your customers in so many ways—but do you have full visibility of these interactions? How should you safeguard your online brand and maintain GDPR compliance across this digital landscape?

Join our webinar to hear Markus Grueneberg and Jonathan Lee share recommendations and best practices to defend your customers and your business within the digital channels that you operate in.

‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

During the webinar, we’ll cover:
-- Trends in volume and type of attack providing useful insights for both defenders and organizations.
-- Ransomware and Email Fraud - how effective have they become and who is being targeted the
most.
-- How bad actors are using cloud services to their benefit
-- Live Q&A with the speakers

Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

o Prevent cyberattacks by stopping them before they start

o Defend against email and cloud threats

o Respond quickly to threats and limit the damage they could cause

About the presenter:

With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.

Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

•Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
•Approaches for identifying suspicious messages
•The latest in security software to fight against advanced threats

What are the key components of a best-in-class solution for phishing simulation and training?

Join us for a live demo of Wombat Security to see for yourself!

Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.

Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.